IT test (final exam)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

list different authentication methods

1. something you know 2. something you have 3. something about you

the internet is migrating to internet protocol version 6 (IPv6), which uses ______ addresses to provide for many more devices than earlier versions

128-bit

why are advances in 5G technology expected to influence the IoT?

5G enables many devices to transmit data quickly to the cloud

which of the following systems can help identify your current geolocation?

GPS

how do fair information practices in the United States and the European Union differ?

Unlike the EU, the U.S. has no single, overarching national data privacy policy

which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data?

`predict and adapt

What is internet of things?

a network of physical objects embedded with sensors, processors, software, and network connectivity capability

one drawback with relying on IoT application to maintains the safety of critical systems is that ______

a poor or absent network connection can result in missing data

Emily researches private clouds while working on a proposal to move her organization to the cloud. She learns that ____

a private cloud is often comparable in cost to or less expensive than an on-premises environment

_____ is typically used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU)

a register

important functions of the chief information officer include

all of these

what must a networked device possess to truly belong to the IoT?

an IP address

Tesla and google have been pioneers in developing IoT devices that analyze data from the cloud and from on-board cameras and sensors to determine when to speed up, slow down, change lanes, or turn while moving. What are these devices called?

autonomous vehicles

the high-speed communications links that span the globe over land and under sea make up the internet _____

backbone

when you successfully connect your computer to a printer using ______, the two devices will be 10 to 30 feet apart and the computer will transmit to the printer at a rate of about 2 mbps

bluetooth

one of the first things developers of IoT applications should focus on is _____

building in security from the start

Which of the following is a markup language for defining the visual design of a web page or group of pages?

cascading style sheets (CSS)

______ is the process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks

certification

Graydon noticed jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. on the other hand, if he reports the incident, both his friend and probably all their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

choosing an alternative

The world wide web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as _______

client/server architecture

_______ refers to a computing environment where software and storage are provided as an internet service and accessed with a web browser

cloud computing

to successfully fight computer crime in a court of law, prosecutors and victims depend on a properly handled

computer forensics investigation

A common reason an organization chooses a private rather than a public cloud environment is _____

concerns about data security

which type of IoT application relies on individual devices that each gather a small amount of data and enables manual monitoring using simple threshold-based exception altering?

connect and monitor

which type if IoT application enables automatic monitoring combined with remote control, trend analysis, ans reporting by using individual devices that each gather a small amount of data?

control and react

the software on a client computer accessing the web must be able to _______

display the results returned by web servers

A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building

false

a wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits

false

solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips

false

the transmission control protocol (TCP) is responsible for managing IP addresses and internet domain names

false

today, many organizations can function and compete effectively without computer-based information systems

false

when you receive a text message that there is a problem with your bank account and you are required to click on link to submit some information, you are likely seeing a vishing attack

false

the first two steps an organization must take to perform a security risk assessment are to identify ____ respectively

hardware, software, and information systems used to achieve business objectives and possible occurrences that would negatively impact them

IoT technology can be used to control thermostats, home security systems, appliances, and motorized blinds via a smartphone app. This is known as ______

home automation

the area covered by one or more interconnected wireless access points is commonly called a(n)

hot spot

which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?

hybrid

in which step of the ethical decision-making process is it essential to communicate well with all stakeholders and have someone they trust and respect explain why things are changing and how this will benefit them?

implement the decision

one example of an ethical dilemma related to safety-critical system is whether to risk making the product more expensive, and potentially less appealing to customers, by

including hardware mechanisms to back up or verify software functions.

Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines?

increased redundancy

A(n) ___ device provides data and instructions to the computer and receives results from it.

input/output

If your home air conditioner has an IP address, it is part of the _____

internet of things

which of the following takes automation to a deep, broad level--one where interconnectivity between various devices exists in a way it never did before?

internet of things

An internal corporate network built using internet and world wide web standards and products is known as a(n)________

intranet

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?

it automates configuration, policy management, and other tasks

which of the following is the correct description of a firewall

it is a software and hardware combination that limits the incoming and outgoing internet traffic

what happens to the data gathered by IoT sensors

it passes over the network and is gathered and stored

legal consequences following a successful cyberattack on a well-known organization often include

lawsuits initiated by consumers who incurred damages

the component of a computer that provides the CPU with a working storage area for program instructions and data is called the ______

main memory

which network topology uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area?

mesh

A ______ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city

metropolitan area network (MAN)

Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?

more cell towers will need to be installed

why is an iceberg, most of which is underwater, an appropriate analogy for the consequences of a cyberattack?

most people only think of the direct impact of the attack, not the many other, oft-hidden effects

Marleys computer has a math chip to perform mathematical calculations and a graphics chip to manipulate graphics while the CPU is busy with other activities. What processing approach is she using?

multiprocessing using coprocessors

what a very short-range wireless connectivity technology enables exchange of data over a few inches of space between two devices, such as a smartphone and point-of-sale terminal?

near field communication (NFC)

in a typical network, routing and switching of data and enabling access to applications are performed by hundreds or thousands of ______

network devices

Ethical Business Practices

often raise an organizations priority with suppliers and other business partners

the purpose of ____ is to use email messages to make the recipients reveal personal data

phishing

A single-tenant cloud computing environment is also known as a(n)

private cloud

completing an instruction involves two phases-instruction and execution- which are each broken down into two steps for a total of four steps. which of the following is NOT one of the four steps?

process data

CPU clock speed is the predetermined rate at which the processor

produces a series of electronic pulses

web servers must be programmed to ______

receive and process user requests

after a successful cyberattack, the funds spent on repairing affected systems, restoring lost data, and performing a post-incident analysis are considered part of the

recovery cost

dodge work for a manufacturing firm where IoT and smart building systems monitor and control the usage of electrical systems. This benefits the firm primarily through _______

reduced costs

which type of networking device directs data packets to other networks until each packet reaches its destination, and thus forms the internet backbone?

router

Annie, who works for a banking organization, recommends that her employers utilize the IoT in the form of video surveillance cameras and smart locks. Which business benefit of the IoT does Annie probably think they will gain from this change?

safety of the premises and their physical and digital assets

the class of computer systems used by multiple concurrent users offers business the potential to increase their processing capability to handle more users, more data, or more transactions in a given period, which is known as

scalability

a ______is a valuable tool that enables a user to find information on the web by specifying words or phrases known as keywords, which are related to a topic of interest

search engine

autonomous vehicles will rely on 5G for their _______

sensors

A _____ is a computer employed by Many users to perform specific task, such as running network or internet applications

server

which of the following is used to create a program that runs on a web server and deals with generation of the content of a web page to satisfy an end-user's request?

server-side programming

which of the following choices will help you score better (that is, as more secure) on a security self-assessment?

setting your home wireless routers encryption method to WPA2

which of the following will prevent a product from being rated as a high-quality software system?

software defects

A _______ network is one in which all network devices are connected to one another through a single central device called the hub node

star

Mavis asks her mobile carriers representative how the upcoming rollout of 5G technology will affect smartphones that can use it. The representative explains that smartphones that operate on 5G networks will ______

support enhanced augmented and virtual reality experiences

the ancestor of the internet was _____

the ARPANET

Americans who are in favor of expanded government surveillance programs argue that

the U.S. government is obligated to do all that it can to ensure citizens' security

the Supreme Court has ruled that the right to anonymous expression is protected by

the first amendment

in a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is

the information systems security analyst

J.T.'s new refrigerator is part of the IoT. In the user manual, he reads that this fridge collects data on temperatures and compressor operation. Assuming J.T. sets up his fridge's internet connection, where does the data from J.T.'s refrigerator end up?

the manufacturer's operational historical database

_______ consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the internet.

the web

security is a serious issue with IoT applications because _____

they can expose internal systems to hacking, viruses, and malware

one reason at&t and Verizon have plans to expand their 5G networks is that ______

they can support many more devices at one time than 4G networks

which type of IoT application assists with the creation of new business models, products, and services through the combination of sensor data and external data to provide new insights?

transform and explore

A client is any computer on a network that sends messages requesting services from the servers on the network

true

A virtual private network (VPN) can support a secure connection between a company's employees and remote users, usually through a third-party service provider

true

In the utilities industry, IoT sensors are used extensively to capture operational data and help the utility provider achieve 24/7 uptime

true

an employee marked for a lay-off sent threatening emails to his boss, stating that he is going to delete sensitive data. This employee can be charged under the computer fraud and abuse act

true

default usernames and passwords should always be changed

true

linux is an open-source operating system

true

the internet is the infrastructure on which the web exists

true

the term ethics refers to the set of principles about what is right and wrong that individuals use to make choices, whereas the term law refers to a system of rules that tells us what we can and cannot do.

true

there are laws that require businesses to prove their data is secure

true

while information systems were once primarily used to automate manual processes, they have transformed the nature of work and the shape of the organizations themselves

true

domain names must always hav at least _____ parts, with each part separated by a dot (period)

two

As a result of the analysis of aggregated sensor data, an IoT device may receive ______

updates, alerts, or even automatic adjustments

discuss what makes a password strong

using capital letters as well as lowercase letters, numbers, and other characters to make a password 8 characters or longer will make your password strong

on the back of a credit card the three-digit number above the signature panel is used to

verify the card if legitimate and not a stolen card number

IoT devices help organizations deepen their understanding of consumer preferences and behaviors using data from _____

video surveillance, social media, mobile, and internet usage

an information system that operates in the ___ sphere of influence supports teamwork between two or more people who work together to achieve a common goal, regardless of where those team members live.

workgroup

you wish to use your personal laptop computer at work. however, the IT department folks are unwilling to allow you. the likely reason is

your non-work related use of the laptop could increase vulnerability


संबंधित स्टडी सेट्स

HESI for Pharmacology Drug Study List

View Set

Chapter 2. Designing a Healthy Dietary Pattern Assignment

View Set

Algebra 1 - Exponent Properties & Exponential Expressions

View Set

Chapter 13: The Brokerage Business

View Set

Sports in American History ch. 5-7

View Set